SIP Security BY, Vivek Nemarugommula. vulnerabilities Registration Hijacking.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

Internet Protocol Security (IP Sec)
Web security: SSL and TLS
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Lecture 6: Web security: SSL
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
1 Kommunikatsiooniteenuste arendus IRT0080 Loeng 5 Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
Impacts of Security Protocols on Real- time Multimedia Communications Kihun Hong 1, Souhwan Jung 1, Luigi Lo Iacono 2, Christoph.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
SIP Security Matt Hsu.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
IEEE Wireless Local Area Networks (WLAN’s).
TinySec: Link Layer Security Chris Karlof, Naveen Sastry, David Wagner University of California, Berkeley Presenter: Todd Fielder.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
SIP Greg Nelson Duc Pham. SIP Introduction Application-layer (signaling) control protocol for initiating a session among users Application-layer (signaling)
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Key Management Workshop November 1-2, Cryptographic Algorithms, Keys, and other Keying Material  Approved cryptographic algorithms  Security.
Network Security Essentials Chapter 5
Team Members Atcharawan Jansprasert Padmoja Roy Rana Almakabi Ehsan Eslamlouevan Manya Tarawalie.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
Network Security David Lazăr.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
TinySec : Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof :: Naveen Sastry :: David Wagner Presented by Anil Karamchandani 10/01/2007.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
A Technical Review of ROC, Cryptographic Context, Indices, and Sliding Windows.
Stein-65 Slide 1 PW security measures PWE3 – 65 th IETF 10 November 2005 Yaakov (J) Stein.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Dec GPP2 TSG-X PDS 1 BCMCS Higher-Layer Encryption Raymond Hsu, Jun Wang Qualcomm Inc. Dec Notice QUALCOMM Incorporated grants a free, irrevocable.
SMUCSE 5349/7349 SSL/TLS. SMUCSE 5349/7349 Layers of Security.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
Secure Socket Layer SSL and TLS. SSL Protocol Peer negotiation for algorithm support Public key encryptionPublic key encryption -based key exchange and.
Analysis of SIP security Ashwini Sanap ( ) Deepti Agashe ( )
K. Salah1 Security Protocols in the Internet IPSec.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Cryptography CSS 329 Lecture 13:SSL.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Whatsapp Security Ahmad Hijazi Systèmes de Télécommunications & Réseaux Informatiques (STRI) 20 April 2016.
IP Security (IPSec) Encapsulating Security Payload (ESP) Dr Milan Marković.
IPSec Detailed Description and VPN
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
CSE 4905 IPsec.
Chapter 18 IP Security  IP Security (IPSec)
Secure Sockets Layer (SSL)
Virtual Private Networks (VPNs)
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

SIP Security BY, Vivek Nemarugommula

vulnerabilities Registration Hijacking

Proxy Impersonation

Message Tampering

Session Tear Down

Denial of Service (DoS)

SIP Security Architecture

Digest Authentication Sip Provides A challenge-based mechanism for authentication that is based on authentication in HTTP. This scheme is known as Digest authentication due to the use of MD5 hashing function on the username/password combination When a client tries to establish a connection with UAS, registrar, or redirect server, the server sends the 401 Unauthorized response to challenge the identity of a UAC. When the client initializes a connection with a proxy server, the proxy responds with the 407 Proxy Authentication Required to challenge the UAC.

Challenge Based Authentication

Digest Authentication Headers SIP uses headers for Authentication The WWW-Authentication header is used in 401 response message sent by the server. In response to the 401 challenge, the UA should include a Authorization header containing the credentials in the next request. Similarly, the Proxy-Authenticate header is used in 407 response message sent by the proxy.

Description Of Parameters

After the client receives the 401 or 407 challenge from the server, it re-submits a request with the credentials by including an Authorization (in response to 401) or Proxy-Authorization (in response to 407) header field with request.

Parameters in Authorization Header

Digest Calculation The Method of calculating the Request-Digest is as follows: Default algorithm MD5 is used.

Digest Calculation

Problems with Digest Hash is weak Authenticating a request to more than one element is problematic Leaks hash to elements in the path Not well implemented In practice, DIGEST is only good for authenticating to the first hop

Secure MIME (S/MIME) SIP messages carry MIME bodies and the MIME standard includes mechanisms for securing MIME contents to ensure both integrity and confidentiality by means of the multipart/signed and application/pkcs7-mime MIME types Provides end-to-end integrity protection and encryption of the body and parts of the message header X.509 certificates are used to identify the end users on the basis of their addresses which are part of the SIP URI The signing of MIME bodies is the lesser problem since each user is in possession of her private key and the user certificate may be forwarded to the recipient embedded into the pkcs7- mime or pkcs7-signature attachments

S/MIME On the other hand the encryption of MIME bodies, e.g. the Session Description Protocol (SDP) payload [HJ98] requires the foreknowledge of the recipient’s public key. This key, usually certified by X.509 certificate must either be pre-fetched from a public directory or may be requested from the peer via a special SIP message. Any mechanisms depending on the existence of end-user certificates are seriously limited in that there is virtually no consolidated authority today that provides certificates for end- user applications on a global scale.

Protecting the Signaling: TLS Hop-by-hop transport security Typically, endpoints enter into a serverauth relationship with a server and authenticate using DIGEST

Problems With TLS Key distribution makes mutual authentication impractical (so far) Only protects one hop - no assurances of what happens beyond that hop

SIPS “Secure” sip, like https is to http Proxies receiving a sips request are required to forward only on secure transports (weakened in private domains) Not as strong as https - no way to tell if a proxy doesn’t conform to the requirement

Protecting the Media: SRTP Encrypts individual media packets using a symmetric session key. Session key must be securely exchanged - current recommendation is to use S/MIME in the signaling.

The Secure Real-Time Transport Protocol (SRTP) Both RTP and RTCP packets can be cryptographically secured by the Secure Real-time Transport Protocol (SRTP) and the companion Secure Real-time Transport Control Protocol (SRTCP) The Secure RTP Packet Format: only the RTP payload body (including any RTP padding if present) is encrypted. The Master Key Identifier (MKI) field is optional and identifies the master key from which the session keys were derived. The 16 bit sequence number already present in the RTP packet is used together with a 32 bit rollover counter (ROC) which is part of the cryptographic context for the SRTP session to prevent replay attacks. The authentication tag is a cryptographic checksum computed over both the header and body of the RTP packet.

Secure RTP Packet Format

The Secure RTCP Packet Format

RTCP (continued) The RTP control packets are secured in a similar way as the RTP packets themselves, one difference being that the use of the authentication tag is mandatory. Otherwise it would be possible for a malevolent attacker e.g. to terminate an RTP media stream by sending a BYE packet. An additional field is the SRTCP index which used as a sequence counter preventing replay-attacks. The MSB of the index field is used as an Encryption flag (E) which is set if the RTCP body is encrypted.

Default Encryption Algorithms

Encryption using AES in counter mode. In principle any encryption scheme can be used with SRTP. As default algorithms the NULL cipher (no confidentiality) and the Advanced Encryption Standard in Counter Mode (AES-CTR) are defined. AES in counter mode acts as a keystream generator producing a pseudo-random keystream of arbitrary length that is applied in a bit- wise fashion to the RTP/RTCP payload by means of a logical XOR function, thus working as a classical stream cipher. In order to work as a pseudo-random generator AES is loaded at the start of each RTP/RTCP packet with a distinct initialization vector (IV) that is derived by hashing a 112 bit salt_key, the synchronisation source identifier (SSRC) of the media stream, and the packet index.

Encryption (continued) Encrypting this IV results in an output of 128 pseudo-random bits. By counting the IV up by increments of one as many keystream blocks can be generated as are required to encrypt the whole RTP/RTPC payload. AES used in counter mode instead of the more common cipher block chaining mode (CBC) has the big advantage that the keystream can be precomputed before the payload becomes available thus minimizing the delay introduced by encryption

Default Authentication Algorithm

Authentication using HMAC-SHA-1 The default SRTP message authentication algorithm is HMAC- SHA-1, based on the popular 160 bit SHA-1 hash function. Cryptographical security is achieved by hashing a 160 bit secret auth_key into the checksum which is then truncated to 80 bits in order to reduce the packet overhead and which has the further advantage that it hides the complete internal state of the hash function. In applications where transmission bandwidth is a problem the authentication tag might be weakened to 32 bits.

Session Key Derivation The encryption and authentication algorithms described earlier both require secret symmetric session keys that must be known to all user agents participating in a SIP session. The SRTP standard offers a partial solution by deriving all needed session keys from a common master key but leaves open the distribution of the master key itself. Again the AES block cipher is used in counter mode to generate the necessary keying material. The pseudo-random generator is loaded with an IV that is itself a function of a 112 bit master_salt value, a one byte label and a session key number.

Continued By applying the labels 0x00 up to 0x05, encryption, authentication and salting keys for both SRTP and SRTCP are derived from the same master key. If a key derivation rate has been defined then every time a number of packets equivalent to the key derivation rate have been sent, a new set of either SRTP or SRTCP session keys are computed.

Session Key Derivation (cont)

Conclusions DIGEST is only good for authenticating to the first hop. Authenticating a request to more than one element is problematic S/MIME Suffers from same key distribution issue hindering mutual-auth TLS. Needs research on improving protection through SIP Identity. Improving Protection through certificates and credentials.

References SIP Security Andreas Steffen, Daniel Kaufmann, Andreas Stricker tudents/DigestAuthenticationReport.pdf